John Sileo's identity was stolen from his business and used to embezzle $300,000 from his clients. While the thief covered his crimes using Sileo's identity, John and his business were held legally and financially responsible for the felonies committed. The breach destroyed John's company and consumed two years of his life as he fought to stay out of jail.
In response, John made it his mission to help others protect the private data that represents their wealth. Now, one of America's leading keynote speakers on Cyber Security, Identity Theft and Social Engineering,
John specializes in making data security fun and engaging, so that it works.
His most requested topics include cyber security, identity theft prevention, online privacy, social media exposure, mobile technology, Internet of Things, cyber leadership, fraud detection and social engineering.
Weaving his story together with cutting-edge research, disarming humor and constant audience interaction, John inspires data security from the inside out - from the individual to the workplace. Information is everyone's most profitable and productive asset - but it is human beings who defend it.
John is the award-winning author of many books, including Your Data is Showing and Privacy Means Profit (Wiley), and has appeared on 60 Minutes, Anderson Cooper and Fox Business. His satisfied clients include the Pentagon, Visa, Blue Cross Blue Shield, UMass, FDIC, Pfizer, Federal Trade Commission, Northrop Grumman, European Information Security Summit, Lincoln Financial, Department of Homeland Security, AARP, Prudential, Federal Reserve Bank, and scores of organizations, universities, and associations of all sizes.
John is CEO of The Sileo Group, a privacy think tank that helps organizations protect the privacy that drives their profits. He graduated from Harvard University with honors and spends his free time snowshoeing the Rocky Mountains with his remarkable wife and two highly spirited daughters.
***John was recently inducted into the National Speakers Hall of Fame***
John Sileo's identity was stolen from his business and used to embezzle $300,000 from his clients. While the thief covered his crimes using Sileo's identity, John and his business were held legally and financially responsible for the felonies committed. The breach destroyed John's company and consumed two years of his life as he fought to stay out of jail.
In response, John made it his mission to help others protect the private data that represents their wealth. Now, one of America's leading keynote speakers on Cyber Security, Identity Theft and Social Engineering,
John specializes in making data security fun and engaging, so that it works.
His most requested topics include cyber security, identity theft prevention, online privacy, social media exposure, mobile technology, Internet of Things, cyber leadership, fraud detection and social engineering.
Weaving his story together with cutting-edge research, disarming humor and constant audience interaction, John inspires data security from the inside out - from the individual to the workplace. Information is everyone's most profitable and productive asset - but it is human beings who defend it.
John is the award-winning author of many books, including Your Data is Showing and Privacy Means Profit (Wiley), and has appeared on 60 Minutes, Anderson Cooper and Fox Business. His satisfied clients include the Pentagon, Visa, Blue Cross Blue Shield, UMass, FDIC, Pfizer, Federal Trade Commission, Northrop Grumman, European Information Security Summit, Lincoln Financial, Department of Homeland Security, AARP, Prudential, Federal Reserve Bank, and scores of organizations, universities, and associations of all sizes.
John is CEO of The Sileo Group, a privacy think tank that helps organizations protect the privacy that drives their profits. He graduated from Harvard University with honors and spends his free time snowshoeing the Rocky Mountains with his remarkable wife and two highly spirited daughters.
***John was recently inducted into the National Speakers Hall of Fame***
Savvy Cybersecurity in a World of Weaponized A.I.
Artificial Intelligence makes hacking your organization easier. Generative A.I. models evolved from ChatGPT give novice cybercriminals free tools to code malware, create adaptive ransomware, and author sophisticated phishing emails around the clock. Deepfake videos imitate people in power to manipulate your performance, profits and reputation while disinformation campaigns blur the lines of trust. And quantum computing is about to render current defenses nearly useless. Are you prepared?...
Blockbuster Cybersecurity in a Zero-Trust World
Hackers don’t just adapt to change; they bank on it. Has your mindset evolved? The rapid expansion of remote workforces, ransomware gangs, cloud jacking, IoT hacking, supply chain attacks, social engineering and disinformation campaigns have altered the way we must defend our data, reputation, and profits. Cybersecurity doesn’t grow from shinier tools, but from the powerful intersection between humans and technology. In this keynote, John leverages potent lessons learned from losing...
The Art of Human Hacking: Social Engineering Self Defense
Anti-fraud and social engineering training only work when your people experience it in person. Human beings can be the weakest link or the strongest competitive advantage in the security and profitability of your information assets. But people are the most commonly underutilized, least expensive weapon in your fight against cybercrime. Social Engineering Training too often fails because of Death by PowerPoint. Fraud training needs to be engaging and interactive to be effective. To put it...
Building a Bulletproof Culture of Security: A Crash Course for Business Leaders
To avoid becoming the next disastrous data-breach headline, you must foster a culture of security that addresses both the technological and human elements of data defense. Change happens when you create buy-in among the people who handle your mission-critical information. You can’t possibly do everything, so you must do the right things. This crash course forges a high-level, non-technical path through cybersecurity. It is a highly interactive presentation that leverages John’s...
Small Business Cybersecurity: A Data Defense Action Plan
Format: _ minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Think Like a Spy: Personal Identity Theft Protection
Identity theft training is no longer optional. Every move you make in the digital world can be tracked, hacked, recorded and exploited. Threat sources like smartphones, the Internet of Things (IoT), wearable technology, cloud computing and social media have shifted the competitive landscape in favor of cyber-savvy users with strong identity theft training. Due to the power of personally identifying information (PII) and the rapid rate at which information is being compromised, we must...
Cyber Threats, Trends & Leadership in the Midst of Crisis (Virtual Program)
Cyber Threats, Trends & Leadership in the Midst of Crisis
A virtual program for leaders, organizations and end users looking to defend their data.
The rules of cybercrime have changed. Much of the workforce has gone remote, making old notions of "perimeter security" outdated. Cybercriminals are leveraging panic and crisis to fuel and fund social engineering scams, ransomware attacks and core-systems hacking. Cloud computing, virtual meetings and Zoombombing will...
Cyber Threat Evolution: Hacking the Hacker's Mindset
Never lose hope or give in to fear, because...
The Hacker's Blacklist: Critical Cybersecurity Threats & Solutions
To avoid becoming the next disastrous data-breach headline, you must foster a healthy culture of security that addresses both the technological and human elements of data defense. Change happens when you create energy and buy-in among the people who handle your mission-critical information. When it comes to the latest data security threats, you can't possibly do everything-but you must do the right things. This cyber security training crash course forges a high-level, non-technical path...
Your Data is Showing – Protecting Your Privacy in the Surveillance Economy
Smart speakers and digital assistants like Alexa, Google and Siri eavesdrop on the conversations you have at home and work, sharing your preferences and behaviors with their "partners". Super cookies collect your browsing history even when you have cookies turned off, selling your privacy to the highest bidder. Mobile phone providers track and trade your location while social media sites like Facebook and Instagram build psychographic dossiers that classify you according to your attitudes,...
4 recomendar John
Publica tu propia reseña verificada cuando contrates a este altavoz a través de eSpeakers.
Construction Financial Management Association, Colorado Chapter
In situ
D.C., President, Construction Financial Management Association, Colorado Chapter
Verificado @fransenpittman.comJohn was extremely knowledgeable in his topic, acutely aware of how data security issues affect our industry and very entertaining. The crowd was glued to his presentation; he made an hour seem like 20 minutes. We had one of our largest audiences ever today, obviously because John's topic is so relevant and timely.
New Jersey Credit Uniion League
In situ
B.A., Director of Education and Training, New Jersey Credit Uniion League
Verificado @njcul.orgIn addition to the relevance of your topic, your passion and delivery style were nothing less than top notch. From stage presence to personally connecting with the audience, you are a true professional yet also very down to earth and easy to work with.
Missouri Association of Public Employee Retirement Systems
In situ
J.W., Executive Director, Missouri Association of Public Employee Retirement Systems
My conference participants complete evaluation sheets on all speakers and your results could not have been better. Some of the comments I received were-"Bring John back again next year--he was both entertaining and informative." "What a speaker/entertainer--a perfect 'wake me back up after lunch' speaker--good content, too".
IIA Denver Chapter Board Member
In situ
D.V., 2012 RMAC Treasurer, IIA Denver Chapter Board Member
Verificado @lincolntrustco.comJohn was dynamic and kept the audience on the edge of their seat. I literally laughed and cried all in the same hour presentation because I felt so connected to his story. I know that other attendees were also as impacted as I was based on conversations that I had afterward. His stories about his personal experiences with fraud were amazing and his solutions were relevant and timely. I personally implemented some of his suggestions for protecting myself the same day.





















